Results 11 to 20 of about 3,206,915 (290)
Dubhe: a deep-learning-based B5G coverage analysis method
In recent years, with the rapid development of various technologies such as the Internet of Things and the Internet, the demand for massive device connections and a variety of differentiated new business applications has continued to increase.
Haoyan Xu, Xiaolong Xu, Fu Xiao
doaj +1 more source
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [PDF]
Today’s cyber-attacks are getting more sophisticated and their volume is consistently growing. Organizations suffer from various attacks in their lifetime each of which exploiting different vulnerabilities, therefore, preventing them all is not ...
Masoud Khosravi-Farmad +1 more
doaj +1 more source
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall +2 more
core +2 more sources
Secure sharing of geospatial wildlife data [PDF]
ISBN:978-1-4503-5047 ...
Frey, Remo M. +4 more
openaire +2 more sources
On the inability of existing security models to cope with data mobility in dynamic organizations [PDF]
Modeling tools play an important role in identifying threats in traditional\ud IT systems, where the physical infrastructure and roles are assumed\ud to be static.
Dimkov, Trajce +2 more
core +16 more sources
Increasing the area of planted forests is rather important for compensation the loss of natural forests and slowing down the global warming. Forest growing stem volume (GSV) is a key indicator for monitoring and evaluating the quality of planted forest ...
Jiangping Long +4 more
doaj +1 more source
Research of Big data and data security [PDF]
With the rise of blogs, social networks, and the vigorous development of cloud computing and Internet technology, the data is increasing at an unprecedented speed and cumulative, the big data era has come. The basic concept of big data, key techniques and the use of there are a lot of doubt and controversy.
Zhongyuan Xu, Qiong Ren
openaire +1 more source
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M. +2 more
core +3 more sources
A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising
Real-time bidding (RTB) is one of the most striking advances in online advertising, where the websites can sell each ad impression through a public auction, and the advertisers can participate in bidding the impression based on its estimated value.
Mengjuan Liu +4 more
doaj +1 more source
On Burst Error Correction and Storage Security of Noisy Data [PDF]
Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. We propose a new model scenario involving burst errors and present for that several constructions.Comment: to be presented at MTNS ...
Fontein, Felix +4 more
core +2 more sources

